By: printersMate
The problem with any cryptography system is dealing with the key exchange required to enable the use of encryption. The use of CAs is a reasonable approach to deal with communication between strangers...
View ArticleBy: Ano Nymous
Actually, the MSM is going to shut up completely about the Pirate Party, just like they always do. We got one “one-question party” (i don’t know what that kind of party is really called in English, but...
View ArticleBy: Ano Nymous
Well, this is approximately what I’ve been trying to tell people for the last three years, but i think youre wrong about who we trust on the different sides of the “pond”. In Sweden, i have only read...
View ArticleBy: printersMate
If one of the multiple CAs is compromised then their signing certificate is revoked, but opther signing certificates remain valid.. With a single CA, when they are compromised then the whole system is...
View ArticleBy: Ano Nymous
Also, Clean IT Project. A law that is being secretly negotiated that is supposed to force companies into monitoring and censoring different types of online content by users. MSM doesn’t say a word....
View ArticleBy: Anonymous
Communication security is a fundamental enabling technology for privacy, although I agree that they’re not the same thing. All authentication systems eventually collapse to an axiomatic trust decision...
View ArticleBy: printersMate
Privacy is controlling the spread of information, and depends on trusting the people to whom you give the information. Communications security can only protect data in transit. File encryption can...
View ArticleBy: Björn Persson
Wrong. If you have compromised one CA, then you can issue a seemingly valid certificate for whichever domain name you want. Then you can redirect your victims’ requests to your own malicious website,...
View ArticleBy: Corruption
What about companies and government sharing your data including location and login information? In some country, somewhere, your info will be for sale… If I remember correct, telephone companies share...
View ArticleBy: Ano Nymous
The wrong kind of information IS dangerous. I said it. Dangerous. Dangerous. Dangerous. Because if certain information and certain humans together is dangerous and you want to get rid of the danger,...
View ArticleBy: A swede
Decentralized P2P crypto-networks of public key certificates? 1. If X % of my “friends” say something, then I believe them. 2. Small world phenomenon.
View ArticleBy: Esduardo Partarroyo
Why do you publicite this so late? why in 2015 when nothing can be done with this information. Even me realized this years ago, but who would believe me? Is it a coincidence this new whas published in...
View ArticleBy: Ano Nymous
Well, this is approximately what I’ve been trying to tell people for the last three years, but i think youre wrong about who we trust on the different sides of the “pond”. In Sweden, i have only read...
View ArticleBy: printersMate
If one of the multiple CAs is compromised then their signing certificate is revoked, but opther signing certificates remain valid.. With a single CA, when they are compromised then the whole system is...
View ArticleBy: Ano Nymous
Also, Clean IT Project. A law that is being secretly negotiated that is supposed to force companies into monitoring and censoring different types of online content by users. MSM doesn’t say a word....
View ArticleBy: Anonymous
Communication security is a fundamental enabling technology for privacy, although I agree that they’re not the same thing. All authentication systems eventually collapse to an axiomatic trust decision...
View ArticleBy: printersMate
Privacy is controlling the spread of information, and depends on trusting the people to whom you give the information. Communications security can only protect data in transit. File encryption can...
View ArticleBy: Björn Persson
Wrong. If you have compromised one CA, then you can issue a seemingly valid certificate for whichever domain name you want. Then you can redirect your victims’ requests to your own malicious website,...
View ArticleBy: Corruption
What about companies and government sharing your data including location and login information? In some country, somewhere, your info will be for sale… If I remember correct, telephone companies share...
View ArticleBy: Ano Nymous
The wrong kind of information IS dangerous. I said it. Dangerous. Dangerous. Dangerous. Because if certain information and certain humans together is dangerous and you want to get rid of the danger,...
View Article
More Pages to Explore .....